Kubernetes Security via Admission Control
Kubernetes isn’t (just) fun and games anymore. It’s being rolled out for production; it’s mission-critical; and all the security and compliance rules and regulations of the old world need to somehow...
Coming out of the dark – what is shadow IT and how to deal...
Everyone who works in a large organization knows it: there are (probably) a lot of IT projects that are not officially sanctioned. Although not a new phenomenon, it is important to...
The four-eyes principle: what’s important in a DevOps world
DevOps accelerates everything from code to production. Manual approvals for releases and deployments quickly become a thing of the past. DevOps teams need to embrace security and compliance in their day-to-day...
Useful things you need to know about system hardening
Since Dev and Ops related activities blend together in a DevOps world, developers need to understand more than just coding their application. Their role also includes typical Ops work: packaging and...
Get the evil out – don’t run containers as root
Containers are not hot and shiny anymore. They are a common piece of the puzzle when it comes to building great software. But a common pitfall, even now, is that many...
Threat Modeling enhances system security
Over the last couple of years, security has become a major topic for every DevOps team. Cloud-first initiatives of various companies help to push the DevSecOps movement forward. The transition to...
F5 Container Ingress Services blends BIG-IP with cloud-native workloads
In this final installment of our Amazic World series sponsored by F5, we’re looking at F5’s continued investments in datacenter security for container deployments using F5 Container Ingress Services.
This is post...
F5 NGINX Ingress Controller and App Protect in a cloud-native, container world
In this post in our series of F5’s application services, we’re looking at how F5 and specifically NGINX help application development and DevOps teams, with features like the NGINX Ingress Controller...
How to protect against the OWASP top 10 and beyond
Application security is a top priority in the IT security landscape for every organisation. Applications are the pathway to your data, protecting your business means it’s critical that you understand the...
‘From Code to Customer’, F5’s commitment to application delivery and security
F5’s motto is From Code to Customer. In this post, we’ll look at how F5’s product portfolio implements that vision with its products.
This is post 1 of 4, in the Amazic...